Header of death: security implications of IPv6 extension headers to the open-source firewall
Anazel P. Gamilla, Marlon A. Naagas
Abstract
IPv6 extension headers (EHs) contain additional information utilized by network devices (such as routers and firewalls) to determine how to direct or process an IPv6 packet. However, the use of excessive and unknown EHs can lead to the security implications such as evasion and denial of service (DoS) of the target firewall. Study revealed that there is no permanent remediation that prevents the IPv6 EHs attack from invading the open-source firewalls by default. Using IPv6 packet manipulations technique, the attacker can evade the target network including the firewall and target host that can lead to a complete unavailability of network service. The common vulnerability scoring system (CVSS) also indicates that the base, temporal, and environment metric groups of IPv6 EHs vulnerabilities were in the critical level of severity. Quick and dirty solutions such as denying and allowing packets and IP addresses as preventive measures is still one of the effective ways of defending against the EHs packet manipulation attacks, as a temporary solution to date.
Keywords
IPv6 denial of service; IPv6 extension headers; IPv6 open-source firewall; IPv6 protocol; IPv6 security threats
DOI:
https://doi.org/10.11591/eei.v11i1.3446
Refbacks
There are currently no refbacks.
This work is licensed under a
Creative Commons Attribution-ShareAlike 4.0 International License .
<div class="statcounter"><a title="hit counter" href="http://statcounter.com/free-hit-counter/" target="_blank"><img class="statcounter" src="http://c.statcounter.com/10241695/0/5a758c6a/0/" alt="hit counter"></a></div>
Bulletin of EEI Stats
Bulletin of Electrical Engineering and Informatics (BEEI) ISSN: 2089-3191 , e-ISSN: 2302-9285 This journal is published by the Institute of Advanced Engineering and Science (IAES) in collaboration with Intelektual Pustaka Media Utama (IPMU) .